On the problem of assigning PhD grants
Abstract
References
Recommendations
Identity and access management for the distribution of social grants in South Africa
SAICSIT '07: Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countriesIdentity and Access Management (IAM) is an emerging solution for authenticating and authorising individuals. This begins with determining an individual's 'identity' through identification and verification processes. Then it becomes vital for every ...
Speed Up PhD Completion: a Case Study in Curriculum Changes
SIGITE '17: Proceedings of the 18th Annual Conference on Information Technology EducationWhile the discipline has been changing at a furious pace of every 18 months, the average completion time for PhD in Information Technology remains stuck at 4-5 years. The long duration of the PhD program is a complex issue, since the underlying causes ...
Trust-based identity sharing for token grants
ICCSP '19: Proceedings of the 3rd International Conference on Cryptography, Security and PrivacyAuthentication and authorization are two key elements of a software application. In modern day, OAuth 2.0 framework and OpenID Connect protocol are widely adopted standards fulfilling these requirements. These protocols are implemented into ...
Comments
Please enable JavaScript to view thecomments powered by Disqus.Information & Contributors
Information
Published In
Sponsors
- Sony: Sony Corporation
- Huawei Technologies Co. Ltd.: Huawei Technologies Co. Ltd.
- Baidu Research: Baidu Research
- The International Joint Conferences on Artificial Intelligence, Inc. (IJCAI)
- Lenovo: Lenovo
Publisher
AAAI Press
Publication History
Qualifiers
- Article
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 0Total Downloads
- Downloads (Last 12 months)0
- Downloads (Last 6 weeks)0